Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed

Contact tracing apps unsafe if Bluetooth vulnerabilities not fixed

As more governments turn to contact tracing apps to aid in their efforts to contain the coronavirus, cybersecurity experts are warning this may spark renewed interest in Bluetooth attacks. They urge developers to ensure such apps are regularly tested for vulnerabilities and release patches swiftly to plug potential holes, while governments should provide assurance that their databases are secure and the data collected will not be used for purposes other than is originally intended. 


Users also should take the necessary steps to safeguard their personal data and prevent their devices from becoming the target of cybercriminals.


According to Acronis' co-founder and technology president Stas Protassov, Bluetooth had several vulnerabilities in the past including as recent as February where BlueFrag, a critical vulnerability that affected Android devices, was patched, and multiple ones in Apple iOS devices


Left unpatched, these devices could be breached by hackers within the vicinity and the user's personal data stolen, Protassov warned, and stressed the need for users to update their devices' firmware to ensure vulnerabilities were promptly fixed. And as with any app, they also should check the permissions that all contact tracing apps requested. 


Most of these apps, including Singapore's TraceTogether, use Bluetooth signals to detect others in close proximity, and security observers say it may leave the smartphone susceptible to threats, especially if there are undiscovered or unfixed vulnerabilities. 

"People will want to download these apps to help curb the pandemic, but they also need to be aware of the cyb ..

Support the originator by clicking the read the rest link below.